SlideShare a Scribd company logo
TK3183-Teknologi Switching LAN
Keamanan pada Switch
Prajna Deshanta Ibnugraha, ST. MT. CCENT. CCNA
Email : prj@politekniktelkom.ac.id
Hanya dipergunakan untuk kepentingan pengajaran di lingkungan politeknik
Telkom
Tahun Ajaran 2013/2014
Semester Gasal
Switch Security Attack
 MAC Address Flooding
 Spoofing Attack
 CDP Attack
 Telnet Attack : Brute Force, DoS Attack
Spoofing Attack
CDP Attack
Security Check
 Network Security Audit
 Network Penetration Testing
Metode Pengamanan Switch
 Fitur keamanan Switch Manageable yang dapat
dimanfaatkan adalah
Port Security
Chase Topology
Chase 1
 Konfigurasi :
Switch(config)# interface fastethernet 0/2
Switch(config-if)# switchport mode access
Switch(config-if)# switchport port-security
Switch(config-if)# switchport port-security mac-
address [mac-PC]
 Gantilah PC yang memiliki MAC address yang
berbeda
 Analisa hasilnya : kesimpulan???
Chase 2
 Konfigurasi :
Switch(config)# interface fastethernet 0/2
Switch(config-if)# switchport mode access
Switch(config-if)# switchport port-security
Switch(config-if)# switchport port-security maximum 2
Switch(config-if)# switchport port-security mac-
address sticky
Switch(config-if)# end
 Gantilah PC yang memiliki MAC address berbeda-beda
sebanyak 3 kali
 Analisa hasilnya
Chase 3
 Konfigurasi :
Switch(config)# interface fastethernet 0/2
Switch(config-if)# switchport mode access
Switch(config-if)# switchport port-security
Switch(config-if)# switchport port-security mac-
address [mac-PC]
Switch(config-if)# switchport port-security
violation restrict
 Gantilah PC yang memiliki MAC address yang
berbeda
 Analisa hasilnya : kesimpulan???
Chase 4
 Konfigurasi :
Switch(config)# interface fastethernet 0/2
Switch(config-if)# switchport mode access
Switch(config-if)# switchport port-security
Switch(config-if)# switchport port-security maximum 2
Switch(config-if)# switchport port-security mac-
address sticky
Switch(config-if)# switchport port-security violation
restrict
 Gantilah PC yang memiliki MAC address berbeda-beda
sebanyak 3 kali
 Analisa hasilnya
Daftar Pustaka
 CCNA Exploration versi 4. CCNA Exploration: LAN
Switching and Wireless. Cisco
 Lammle, Todd. (2011). CCNA Cisco Certified
Network Associate Study Guide, 7th Edition. SYBEX.
 Odom, Wendell. (2011). CCNA 640-802 Official Cert
Library, Updated (3rd Edition). Cisco Press

More Related Content

Recently uploaded

أفضل 11 موقع لعمل اختبارات إلكترونية (Slide Decks).pdf
أفضل 11 موقع لعمل اختبارات إلكترونية (Slide Decks).pdfأفضل 11 موقع لعمل اختبارات إلكترونية (Slide Decks).pdf
أفضل 11 موقع لعمل اختبارات إلكترونية (Slide Decks).pdf
qorrectdm
 
النزاع-ا لعرقي-والقبلي-في-دولة-جنوب-السودان-وانعكاساته-على-بناء-الدولة-4.pdf
النزاع-ا   لعرقي-والقبلي-في-دولة-جنوب-السودان-وانعكاساته-على-بناء-الدولة-4.pdfالنزاع-ا   لعرقي-والقبلي-في-دولة-جنوب-السودان-وانعكاساته-على-بناء-الدولة-4.pdf
النزاع-ا لعرقي-والقبلي-في-دولة-جنوب-السودان-وانعكاساته-على-بناء-الدولة-4.pdf
Gamal Mansour
 
Ingresantes en el examen general unap 2023 I.pdf
Ingresantes en el examen general unap 2023 I.pdfIngresantes en el examen general unap 2023 I.pdf
Ingresantes en el examen general unap 2023 I.pdf
wilfacemeet
 
guia informatica Guanajuato modulo 22 nuples
guia informatica Guanajuato modulo 22 nuplesguia informatica Guanajuato modulo 22 nuples
guia informatica Guanajuato modulo 22 nuples
Examenes Preparatoria Abierta
 
DAFTAR LAMPIRAN CIP FORTUNA [Autosaved].pptx
DAFTAR LAMPIRAN CIP FORTUNA [Autosaved].pptxDAFTAR LAMPIRAN CIP FORTUNA [Autosaved].pptx
DAFTAR LAMPIRAN CIP FORTUNA [Autosaved].pptx
divadewantara1
 
الهندسيه الميكانيكيه الشامله hvac 1
الهندسيه  الميكانيكيه  الشامله  hvac   1الهندسيه  الميكانيكيه  الشامله  hvac   1
الهندسيه الميكانيكيه الشامله hvac 1
maymohamed29
 

Recently uploaded (6)

أفضل 11 موقع لعمل اختبارات إلكترونية (Slide Decks).pdf
أفضل 11 موقع لعمل اختبارات إلكترونية (Slide Decks).pdfأفضل 11 موقع لعمل اختبارات إلكترونية (Slide Decks).pdf
أفضل 11 موقع لعمل اختبارات إلكترونية (Slide Decks).pdf
 
النزاع-ا لعرقي-والقبلي-في-دولة-جنوب-السودان-وانعكاساته-على-بناء-الدولة-4.pdf
النزاع-ا   لعرقي-والقبلي-في-دولة-جنوب-السودان-وانعكاساته-على-بناء-الدولة-4.pdfالنزاع-ا   لعرقي-والقبلي-في-دولة-جنوب-السودان-وانعكاساته-على-بناء-الدولة-4.pdf
النزاع-ا لعرقي-والقبلي-في-دولة-جنوب-السودان-وانعكاساته-على-بناء-الدولة-4.pdf
 
Ingresantes en el examen general unap 2023 I.pdf
Ingresantes en el examen general unap 2023 I.pdfIngresantes en el examen general unap 2023 I.pdf
Ingresantes en el examen general unap 2023 I.pdf
 
guia informatica Guanajuato modulo 22 nuples
guia informatica Guanajuato modulo 22 nuplesguia informatica Guanajuato modulo 22 nuples
guia informatica Guanajuato modulo 22 nuples
 
DAFTAR LAMPIRAN CIP FORTUNA [Autosaved].pptx
DAFTAR LAMPIRAN CIP FORTUNA [Autosaved].pptxDAFTAR LAMPIRAN CIP FORTUNA [Autosaved].pptx
DAFTAR LAMPIRAN CIP FORTUNA [Autosaved].pptx
 
الهندسيه الميكانيكيه الشامله hvac 1
الهندسيه  الميكانيكيه  الشامله  hvac   1الهندسيه  الميكانيكيه  الشامله  hvac   1
الهندسيه الميكانيكيه الشامله hvac 1
 

Featured

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Christy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
GetSmarter
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
Project for Public Spaces & National Center for Biking and Walking
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
Erica Santiago
 

Featured (20)

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 

04 tk3183-keamanan pada-switch

  • 1. TK3183-Teknologi Switching LAN Keamanan pada Switch Prajna Deshanta Ibnugraha, ST. MT. CCENT. CCNA Email : prj@politekniktelkom.ac.id Hanya dipergunakan untuk kepentingan pengajaran di lingkungan politeknik Telkom Tahun Ajaran 2013/2014 Semester Gasal
  • 2. Switch Security Attack  MAC Address Flooding  Spoofing Attack  CDP Attack  Telnet Attack : Brute Force, DoS Attack
  • 5. Security Check  Network Security Audit  Network Penetration Testing
  • 6. Metode Pengamanan Switch  Fitur keamanan Switch Manageable yang dapat dimanfaatkan adalah Port Security
  • 8. Chase 1  Konfigurasi : Switch(config)# interface fastethernet 0/2 Switch(config-if)# switchport mode access Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security mac- address [mac-PC]  Gantilah PC yang memiliki MAC address yang berbeda  Analisa hasilnya : kesimpulan???
  • 9. Chase 2  Konfigurasi : Switch(config)# interface fastethernet 0/2 Switch(config-if)# switchport mode access Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security maximum 2 Switch(config-if)# switchport port-security mac- address sticky Switch(config-if)# end  Gantilah PC yang memiliki MAC address berbeda-beda sebanyak 3 kali  Analisa hasilnya
  • 10. Chase 3  Konfigurasi : Switch(config)# interface fastethernet 0/2 Switch(config-if)# switchport mode access Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security mac- address [mac-PC] Switch(config-if)# switchport port-security violation restrict  Gantilah PC yang memiliki MAC address yang berbeda  Analisa hasilnya : kesimpulan???
  • 11. Chase 4  Konfigurasi : Switch(config)# interface fastethernet 0/2 Switch(config-if)# switchport mode access Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security maximum 2 Switch(config-if)# switchport port-security mac- address sticky Switch(config-if)# switchport port-security violation restrict  Gantilah PC yang memiliki MAC address berbeda-beda sebanyak 3 kali  Analisa hasilnya
  • 12. Daftar Pustaka  CCNA Exploration versi 4. CCNA Exploration: LAN Switching and Wireless. Cisco  Lammle, Todd. (2011). CCNA Cisco Certified Network Associate Study Guide, 7th Edition. SYBEX.  Odom, Wendell. (2011). CCNA 640-802 Official Cert Library, Updated (3rd Edition). Cisco Press

Editor's Notes

  1. Switch memiliki tempat penyimpanan MAC Address yang terbatas, contoh Switch Catalyst seri 2960 hanya dapatr menyimpan 8192 MAC Address. Untuk melihat MAC Address table dapat menggunakan perintah #show mac-address-table DoS Attack  bertujuan agar admin tidak dapat melakukan management ke switch lewat telnet
  2. Rogue DHCP Attacker menyamar sebagai Legitimate DHCP Server dengan memberikan informasi palsu kepada client seperti IP Gateway, DNS Server, dll
  3. CDP Attack dapat dilakukan dengan sniffing, karena CDP secara default di broadcast. Informasi yang didapat dari protokol CDP biasanya berupa spesifikasi perangkat, seperti versi IOS , dll
  4. Network Security Audit  melakukan pemeriksaan terhadap sistem dan jaringan berdasarkan SOP Network Penetration Testing  melakukan percobaan penetrasi terhadap jaringan atau sistem dengan tujuan mengetahui kelemahan untuk dilaporkan kepada yg pemilik sistem.
  5. Port Security adalah fitur dari switch manageable untuk membatasi akses user device, biasanya berdasarkan MAC Address
  6. Dibuat dengan packet tracer
  7. Answer : Port akan shutdown untuk selain MAC Address yang telah dimasukkan
  8. Answer : Port akan restrict/blok (bukan shutdown) untuk setelah MAC Address ke 3 Sticky  mampu belajar terhadap inputan baru